Login / Signup
Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n).
Brian King
Published in:
Int. J. Netw. Secur. (2009)
Keyphrases
</>
elliptic curve
scalar multiplication
elliptic curve cryptography
efficient computation
digital signature
diffie hellman
ad hoc networks
key management
public key cryptosystems